Hello,
Secrets author here. I was just referred to this thread by a Secrets user and thought I'd chime in on the security of small vs large company topic.
As with any complex question, the answer is also non-trivial. So I'll touch on the some of the points mentioned here:
1. Compromised Software
I don't see why smaller companies would be more at risk here than larger companies where many developers have access to the repo and commit from home etc.
To me, the risk grows with the number of devs. And larger companies will usually have policy precisely to combat that risk (think signing commits with a key stored in a YubiKey, for example).
I'm the only one who has access to Secrets source code (not counting GitHub and Apple). The attack surface is arguably much lower for Secrets.
2. Flawed Crypto
I don't think crypto is usually the weakest link in any of the popular password managers. Compromising developer machines, exploiting server vulnerabilities, exploiting design flaws, etc.
(I know all the links above are related to LastPass. I'm not trying to pick on them, they just have the best vulnerabilities.)
Personally, I know I'm not a cryptanalyst, but I know enough about crypto to be scared of it. It's actually pretty easy to design a flawed crypto algorithm simply by combining the wrong cipher, block chaining mode and nonce… That's why I stick to standard high-level protocols (Noise) and crypto libraries (libsodium).
3. Server Upkeep
Keeping an online service available, scalable and secure is not easy. I guess that's probably why many of the smaller devs rely on iCloud, Dropbox, etc.
I've ran an SaaS in the past and I'm well aware of the amount of work maintainig it was.
Secrets relies on iCloud, and although it's not perfect, and I had to design around some of iCloud's quirks, it works, it scales, and Apple is the one maintaining it!
4. Audits
Are they useful? They can be, yes. Are they expensive? Yes. Does it mean a software/service is secure? Not really. LastPass had audits…
I'll eventually get an audit for Secrets. If not only because it's another tick on a potential user's checklist.
Either way, I try to explain all the crypto behind Secrets (local and iCloud storage, shared vaults, etc) on its security page.
Secrets author here. I was just referred to this thread by a Secrets user and thought I'd chime in on the security of small vs large company topic.
As with any complex question, the answer is also non-trivial. So I'll touch on the some of the points mentioned here:
1. Compromised Software
I don't see why smaller companies would be more at risk here than larger companies where many developers have access to the repo and commit from home etc.
To me, the risk grows with the number of devs. And larger companies will usually have policy precisely to combat that risk (think signing commits with a key stored in a YubiKey, for example).
I'm the only one who has access to Secrets source code (not counting GitHub and Apple). The attack surface is arguably much lower for Secrets.
2. Flawed Crypto
I don't think crypto is usually the weakest link in any of the popular password managers. Compromising developer machines, exploiting server vulnerabilities, exploiting design flaws, etc.
(I know all the links above are related to LastPass. I'm not trying to pick on them, they just have the best vulnerabilities.)
Personally, I know I'm not a cryptanalyst, but I know enough about crypto to be scared of it. It's actually pretty easy to design a flawed crypto algorithm simply by combining the wrong cipher, block chaining mode and nonce… That's why I stick to standard high-level protocols (Noise) and crypto libraries (libsodium).
3. Server Upkeep
Keeping an online service available, scalable and secure is not easy. I guess that's probably why many of the smaller devs rely on iCloud, Dropbox, etc.
I've ran an SaaS in the past and I'm well aware of the amount of work maintainig it was.
Secrets relies on iCloud, and although it's not perfect, and I had to design around some of iCloud's quirks, it works, it scales, and Apple is the one maintaining it!
4. Audits
Are they useful? They can be, yes. Are they expensive? Yes. Does it mean a software/service is secure? Not really. LastPass had audits…
I'll eventually get an audit for Secrets. If not only because it's another tick on a potential user's checklist.
Either way, I try to explain all the crypto behind Secrets (local and iCloud storage, shared vaults, etc) on its security page.